Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Topic
Malware Analysis talks at BSides
433 talks tagged
Malware Analysis
from 91 chapters of BSides events worldwide.
Related topics
Case Studies and Incidents Analysis
Technical Deep-dives
Technical
Talk
Blue
Research
49:41
Open Source Malware Lab
Robert Simmons
BSides London
· 2016
Technical
DFIR
Detection Engineering
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2016-07
35:42
Hands-on Writing Malware in Go
Stuart McMurray
Carson Seese
BSides DC
· 2019
Technical
Malware Analysis
Reverse Engineering
Red
Demo
Talk
Open →
2019-10
27:37
PowerShell-Fu — Hunting on the Endpoint
Chris Gerritz
BSides Las Vegas
· 2016
Technical
DFIR
Malware Analysis
Threat Intel
Blue
Technical Deep-dives
Talk
Open →
2016-08
13:22
Watching The Watchers: The Stalkerware Surveillance Ecosystem
Cian Heasley
BSides London
· 2019
Research
Technical
Malware Analysis
Privacy
Reverse Engineering
Talk
Open →
2019-06
36:51
ThreatPursuit VM
Dan Kennedy
BSides Canberra
· 2020
Tooling
Malware Analysis
Threat Intel
Blue
Demo
Talk
Open →
2020-05
1:05:41
Hunting for Credential Dumping Attacks in Modern Windows Environments
Andrew Case
BSides Philly
· 2023
Technical
Active Directory
DFIR
Malware Analysis
Blue
Talk
Open →
2024-01
44:35
Anti-forensics Techniques Used By Threat Actors In The Wild
Hela Lucas
BSides London
· 2024
Technical
DFIR
Malware Analysis
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-02
36:58
Cracking The Perimeter: How Red Teams Penetrate
Dominic Chell
BSides Manchester
· 2018
Technical
Active Directory
Malware Analysis
Advanced
Red
Talk
Open →
2018-08
44:04
Inside Magecart: Their Web Skimming Tactics Revealed
Terry Bishop
BSides London
· 2019
Technical
Malware Analysis
Threat Intel
Web AppSec
Intermediary
Talk
Open →
2019-06
36:55
Malware and Machine Learning: A Match Made in Hell
Mikko Hypponen
BSides Berlin
· 2023
Policy
Technical
AI Security
Malware Analysis
Threat Intel
Keynote
Open →
2024-01
41:58
BotProbe - botnet traffic capture using IPFIX
Mark Graham
Adrian Winkles
BSides London
· 2018
Technical
Malware Analysis
Network Security
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-06
53:54
Reverse Engineering Sherlock Holmes Style: Obfuscated APIs & The Art of Deduction
Katie Deakin-Sharpe
BSides Canberra
Technical
Malware Analysis
Reverse Engineering
Advanced
Blue
Talk
Open →
2025-11
51:34
Let's Get Cooking with CyberChef
Marcelle Lee
BSides Charm
· 2022
Technical
DFIR
Malware Analysis
Threat Intel
Talk
Open →
2022-07
3:19:17
Malware Reverse Engineering
Muhammad Irshad
Muhammad Umair
BSides Islamabad
· 2021
Technical
Malware Analysis
Reverse Engineering
Workshop
Open →
2021-02
40:17
A Threat Analysis of 0ktapus SMS Phishing Campaigns
Will Thomas
BSides Cheltenham
· 2023
Technical
War Stories
Malware Analysis
Social Engineering
Threat Intel
Talk
Open →
2023-06
29:48
Kevin Breen: RATs and IOC's - The Easy Way
Kevin Breen
BSides London
· 2014
Technical
DFIR
Malware Analysis
Threat Intel
Talk
Open →
2014-05
48:23
Koadic C3: Windows COM Command & Control Framework
Sean Dillon
Zach Harding
BSides Las Vegas
· 2017
Technical
Malware Analysis
Advanced
Red
Technical Deep-dives
Demo
Talk
Open →
2017-08
25:08
Behind Enemy Lines by Ido Rozen
Ido Rozen
BSides TLV
· 2022
Research
Malware Analysis
Threat Intel
Web AppSec
Talk
Open →
2022-07
47:29
Easy Ways to Bypass Antivirus Systems
Craig Young
BSides London
· 2014
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Red
Demo
Talk
Open →
2014-05
27:38
Linux Under Siege: Analyzing the Latest Cyber Espionage Tactics and Malware Trends
Marc Rivero Lopez
BSides Budabest
· 2024
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-01
54:48
Malware Analysis — Red Team Edition
Uriel Kosayev
BSides Las Vegas
· 2022
Technical
Malware Analysis
Vulnerability Research
Advanced
Red
Demo
Talk
Open →
2022-09
44:41
Malvertising: Under The Hood
Chris Boyd
BSides Manchester
· 2017
Technical
Malware Analysis
Threat Intel
Web AppSec
Talk
Open →
2017-08
55:25
Confidently Measuring Attack Technique Coverage by Asking Better Questions
Matt Graeber
BSides Augusta
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Blue
Talk
Open →
2021-10
59:07
Malware Analysis 101: N00b to Ninja in 60 Minutes
BSides Las Vegas
· 2014
Technical
Malware Analysis
Intro
Talk
Open →
2016-12
29:31
Master Of Puppets: How To Tamper The EDR?
Daniel Feichter
BSides Munich
· 2022
Technical
Malware Analysis
Reverse Engineering
Advanced
Red
Technical Deep-dives
Talk
Open →
2022-05
26:01
How To Bypass Email Gateways Using Common Payloads
Neil Lines
BSides Manchester
· 2017
Technical
Malware Analysis
Social Engineering
Red
Talk
Open →
2017-08
18:17
Living With Kodi And A Hole In Your Network
Yevgen Goncharuk
BSides Lisbon
· 2018
Technical
IoT
Malware Analysis
Vulnerability Research
Talk
Open →
2018-12
26:38
A Deep Dive into Go Malware: Using Metadata to Empower the Analyst
Joakim Kennedy
BSidesSF
· 2019
Technical
Malware Analysis
Reverse Engineering
Technical Deep-dives
Talk
Open →
2019-03
19:45
Attacking Malware with AI
Dimitris Prasakis
BSides Munich
· 2022
Technical
AI Security
Malware Analysis
Blue
Talk
Open →
2022-05
49:45
The Cyber-Pirate's Guide to C2 Development
Gerhard Botha
BSides Cape Town
· 2023
Technical
Malware Analysis
Tooling
Red
Talk
Open →
2023-12
25:31
Intelligence led Penetration Testing
Cam Buchanan
BSides London
· 2015
Technical
Malware Analysis
Reverse Engineering
Threat Intel
Red
Talk
Open →
2015-07
29:03
macOS Endpoint Security Framework: What It Can Do And How To Use It
Connor Morley
BSides Munich
· 2022
Technical
Detection Engineering
Malware Analysis
Blue
Talk
Open →
2022-05
47:56
Enter The Ninja
Maciej Kotowicz
BSides Warsaw
· 2018
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2018-10
8:00:21
BSides Oslo 2025 — Live Stream
BSides Oslo 2025
Technical
Malware Analysis
Reverse Engineering
Social Engineering
Threat Intel
Web AppSec
Intermediary
Red
+1
Open →
2025-10
29:22
Analyzing AutoIt Malware: Tools and Techniques
Chris Neal
Jerome Radcliffe
BSides Las Vegas
· 2021
Technical
Malware Analysis
Reverse Engineering
Intermediary
Blue
Talk
Open →
2021-08
43:46
Meticulously Modern Mobile Manipulations
Leon Jacobs
BSides Cape Town
· 2019
Technical
Malware Analysis
Mobile Security
Reverse Engineering
Red
Talk
Open →
2019-12
50:58
Threat hunting: Using MITRE ATT&CK against Carbanak malware
Amol Sarwate
BSidesSF
· 2022
Technical
Detection Engineering
Malware Analysis
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2022-07
31:32
Maersk: The Ransomware Survivors
Endrin Musa
BSides Prishtina
· 2017
Technical
DFIR
Malware Analysis
Supply Chain Security
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2023-05
42:15
Adventures in Asymmetric Warfare: Fighting the AV Vendors
Will Schroeder
BSides DC
· 2014
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2014-10
22:40
Pensieve: Finding Malicious Artifacts in Container Environments
Yathi Naik
BSidesSF
· 2018
Technical
Container Security
DFIR
Malware Analysis
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2018-04
18:02
Making Malware Analysis Less Scary
Jack Resetti
BSides London
· 2025
Technical
Malware Analysis
Reverse Engineering
Intro
Blue
Demo
Talk
Open →
2026-03
55:07
Exposing the Neutrino EK: All the Naughty Bits
Ryan Chapman
BSides Las Vegas
· 2016
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2016-08
50:45
iOS Malware: Myth or Reality?
Julien Bachmann
BSides London
Technical
Malware Analysis
Mobile Security
Talk
Open →
2016-07
26:05
CoinMiner Are Evasive - Omri Segev Moyal & Thomas Roccia
Omri Segev Moyal
Thomas Roccia
BSides TLV
· 2018
Technical
Detection Engineering
Malware Analysis
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-07
30:48
A Two-part Saga: Continuing the Journey of Hacking Malware C2s
Vangelis Stykas
BSides Prague
· 2024
Technical
Malware Analysis
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-04
14:55
Connecting the dots: A beginner's experience of threat actor tracking - Keith Short
Keith Short
BSides London
· 2018
Technical
Malware Analysis
Threat Intel
Intro
Blue
Talk
Open →
2018-06
43:19
GO Forth And Reverse
Tim Strazzere
BSides Las Vegas
· 2017
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2017-08
15:44
Chrome Cookie Theft on macOS, and How To Prevent It
Nick Frost
BSides Las Vegas
· 2024
Technical
Malware Analysis
Reverse Engineering
Talk
Open →
2024-09
33:14
Deconstruction Of A Linux Adversarial Toolkit
Christian Giuffre
BSides Canberra
· 2019
Technical
Malware Analysis
Reverse Engineering
Advanced
Technical Deep-dives
Demo
Talk
Open →
2019-05
44:00
The Nation State Actor Ate My Homework!
Liam Smit
BSides Cape Town
· 2019
Research
Hardware Security
Malware Analysis
Reverse Engineering
Threat Intel
Advanced
Case Studies and Incidents Analysis
Empirical Research
+2
Open →
2019-12
26:12
GT - The New Cat and Mouse Game: Attacking and Defending Machine Learning Based Software - Joshua Sa
Joshua Saxe
BSides Las Vegas
· 2017
Research
Technical
AI Security
Malware Analysis
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-09
30:15
Incident Response Evidence Collection & Triage
John Meyers
BSides Peru
· 2017
Technical
DFIR
Malware Analysis
Blue
Demo
Talk
Open →
2017-06
41:29
The Art of Compromising C2 Servers
Vangelis Stykas
BSides Berlin
· 2023
Technical
Malware Analysis
Reverse Engineering
Web AppSec
Advanced
Red
Talk
Open →
2024-01
32:59
EDR Evasion Primer
Jorge Gimenez
BSides Berlin
· 2022
Technical
Active Directory
Malware Analysis
Advanced
Red
Technical Deep-dives
Talk
Open →
2023-02
36:58
Find Me If You Can! How to Locate a DLL's Unexported Functions
Oryan De Paz
BSides TLV
· 2022
Technical
Malware Analysis
Reverse Engineering
Advanced
Red
Talk
Open →
2022-07
28:29
You Don't See Me: Abusing Whitelists to Hide and Run Malware
Michael Spaling
BSides Las Vegas
· 2016
Technical
Malware Analysis
Vulnerability Research
Red
Talk
Open →
2016-08
40:43
Detecting Malicious Certificates Using Machine Learning
Abhishek Sharma
Khaled Al-Hassanieh
Jason Reaves
BSides DC
· 2017
Research
Technical
Cryptography
Malware Analysis
Threat Intel
Talk
Open →
2017-10
41:24
BSides Perth Day 1 (Part 2)
BSides Perth
· 2021
Technical
DFIR
Detection Engineering
Malware Analysis
Talk
Open →
2021-09
31:52
A Case Study of MacOS Supply Chain Compromise
Jason Craig
Michael George
BSidesSF
· 2018
Technical
Detection Engineering
Malware Analysis
Supply Chain Security
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-04
22:03
Let's Make Malware But It Might Get Caught So The Malware Gets Worse
Alex
BSides Canberra
· 2025
Technical
Malware Analysis
Reverse Engineering
Red
Talk
Open →
2025-12
29:46
X-Ray of Malware Evasion Techniques: Analysis, Dissection, Cure
Thomas Roccia
BSides Sydney
· 2023
Technical
Malware Analysis
Reverse Engineering
Blue
Technical Deep-dives
Talk
Open →
2023-05
45:29
Getting Started in Reverse Engineering
Marc Messer
BSides Knoxville
· 2023
Technical
CTF
Malware Analysis
Reverse Engineering
Intro
Talk
Open →
2023-05
45:41
Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored Campaign Against a Foreign Government
Mark Parsons
BSides Charleston
· 2024
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Talk
Open →
2024-11
49:48
AV Evasion - How Adversaries Aim to Bypass Antivirus Tools
Marvin Ngoma
BSides Joburg
· 2024
Technical
Detection Engineering
Malware Analysis
Demo
Talk
Open →
2024-08
57:39
Discovering C&C in Malicious PDFs with obfuscation, encoding and other techniques
Filipi Pires
BSides Athens
· 2021
Technical
Malware Analysis
Reverse Engineering
Workshop
Open →
2021-06
1:29:11
Malwhere? A Cyber Navigation with Divesh Mandhyan
Divesh Mandhyan
Kartik Verma
BSides Noida
· 2025
Technical
Malware Analysis
OSINT
Threat Intel
Talk
Open →
2025-03
50:00
Hunting PowerShell Attacks on The Open Internet
Paul Melson
BSides Augusta
· 2019
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Talk
Open →
2019-10
37:47
Don't Google 'PowerShell Hunting'
Josh Rykowski
Sean Eyre
BSides Augusta
· 2017
Technical
DFIR
Detection Engineering
Malware Analysis
Talk
Open →
2017-09
1:02:52
eBPF For Security Monitoring
James Ogden
BSides Leeds
· 2019
Technical
Detection Engineering
Malware Analysis
Network Security
Demo
Talk
Open →
2019-01
42:18
What Botnet Is This?
Tiago Pereira
BSides Lisbon
· 2015
Technical
Malware Analysis
Reverse Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-07
19:11
Deconstructing APT28's XAgent for OSX
Tiberius Axinte
BSidesSF
· 2018
Technical
Malware Analysis
Reverse Engineering
Blue
Technical Deep-dives
Talk
Open →
2018-04
26:33
Linux ELF Binary Obfuscation
Sergei Kostov
BSides Sofia
· 2023
Technical
Malware Analysis
Reverse Engineering
Advanced
Red
Talk
Open →
2023-03
15:28
No Distribute Scanners:
Florian Murschetz
Mathieu Gaucheler
BSides Munich
· 2021
Research
Malware Analysis
OSINT
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2021-06
29:50
Large NLP Machine Learning Models and Their Upcoming Impact on Cybersecurity
Geoff McDonald
BSides Vancouver
· 2022
Technical
AI Security
Malware Analysis
Threat Intel
Intro
Talk
Open →
2022-07
21:41
Vulnerabilities in Game Distribution via Steam: An Attack Vector for Malware Dissemination
Luiz Henrique
BSides São Paulo
· 2025
Technical
Malware Analysis
Supply Chain Security
Vulnerability Research
Red
Talk
Open →
2025-06
46:30
Script All the Things, Reverse All the Malware: Jython-Enhanced Reverse Engineering with Ghidra
Byron Roosa
BSidesSF
· 2020
Technical
Malware Analysis
Reverse Engineering
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2020-03
27:59
Fuzzing Malware for Fun & Profit
Maksim Shudrak
BSidesSF
· 2019
Technical
Malware Analysis
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
+1
Open →
2019-03
39:09
Deep Adversarial Architectures for Detecting and Generating Maliciousness
Hyrum Anderson
BSides Las Vegas
· 2016
Research
Technical
AI Security
Malware Analysis
Technical Deep-dives
Talk
Open →
2016-08
44:56
FileLess Malware Infections: Malware Tricks for Pentesters
Ramon Pinuaga
BSides Lisbon
· 2017
Technical
Malware Analysis
Reverse Engineering
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-11
27:20
Panda Mirror: How the Chinese CCP Manipulates NPM to Hoard Malware
Paul McCarty
BSides Canberra
· 2025
Research
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Talk
Open →
2025-12
20:44
YARA-as-a-Service (YaaS): Real-Time Serverless Malware Detection
Austin Byers
BSides Las Vegas
· 2017
Technical
Malware Analysis
Tooling
Blue
Demo
Talk
Open →
2017-08
44:37
Malware Analysis for the Masses
Shawn Thomas
BSides Charm
· 2022
Technical
DFIR
Malware Analysis
Intro
Blue
Demo
Talk
Open →
2022-07
45:02
Introduction to Fileless Malware
Juan Araya
BSides Dublin
· 2021
Technical
Malware Analysis
Talk
Open →
2021-05
1:05:35
A Deep Look into a Chinese Advanced Attack
Michael Gough
BSides DC
· 2015
Technical
Detection Engineering
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-12
41:28
How an Android Application Can Drain Your Wallet
Dimitrios Valsamaras
BSides Lisbon
· 2022
Technical
Malware Analysis
Mobile Security
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-12
26:57
The Terror Of Tracking
Daniel Nash
BSides Belfast
· 2018
Technical
Malware Analysis
Privacy
Social Engineering
Intro
Case Studies and Incidents Analysis
Talk
Open →
2018-10
42:06
Attacking Microsoft Exchange: Fusing LightNeuron with Cobalt Strike
Leon Jacobs
BSides Cape Town
· 2023
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Advanced
Purple
Red
Talk
Open →
2023-12
40:55
Quando o Simples Vence: Anatomia Real dos Ataques que Continuam Funcionando
Ricardo Tavares
BSides São Paulo
· 2025
War Stories
Active Directory
Detection Engineering
Malware Analysis
Threat Intel
Blue
Purple
Case Studies and Incidents Analysis
+1
Open →
2025-06
54:13
So You Wanta Build a C2?
iDigitalFlame
BSides Las Vegas
· 2022
Technical
Malware Analysis
Reverse Engineering
Red
Talk
Open →
2022-09
51:16
Rosetta 2: Keeping Mac Malware Alive for Years to Come
Raphaela Mettig
Charles Glass
BSides Dallas/Fort Worth
· 2022
Research
Technical
DFIR
Malware Analysis
Reverse Engineering
Advanced
Empirical Research
Technical Deep-dives
+1
Open →
2022-11
50:15
Unraveling the Threat of Chrome Based Malware
Justin Warner
Spencer Walden
BSides DC
· 2018
Technical
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-11
42:21
Now You C(&C), Now You Don't
Amichai Shulman
Stav Shulman
BSides TLV
· 2022
Research
Technical
Malware Analysis
Network Security
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-07
46:01
Drop It Like It's Qbot: Detecting Initial Execution Earlier with OSINT
Stef Rand
BSides Augusta
· 2023
Technical
Detection Engineering
Malware Analysis
OSINT
Threat Intel
Blue
Talk
Open →
2023-10
34:52
Hiding Your Attacks with Misdirection
Jonathan Echavarria
BSides Orlando
· 2015
Technical
Malware Analysis
Network Security
Threat Intel
Red
Talk
Open →
2015-11
45:17
PowerShell Is Dead – Epic Learnings
Ben Turner
Doug McLeod
BSides Scotland
· 2019
Technical
Detection Engineering
Malware Analysis
Reverse Engineering
Advanced
Red
Talk
Open →
2019-06
30:56
Into the Vo1d: Hunting a Botnet Hidden in TV Boxes
André Tavares
BSides Lisbon
· 2025
Technical
IoT
Malware Analysis
Threat Intel
Intermediary
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-12
51:14
Living Off the Land: Windows Post-Exploitation with Built-in Tools
Christopher Campbell
Matthew Graeber
BSides Augusta
· 2013
Technical
Malware Analysis
Post-Exploitation
Red
Talk
Open →
2013-09
57:27
Security AI in the Real World: Lessons from Deploying ML at Scale
Joshua D Saxe
BSides Las Vegas
· 2022
Research
Technical
AI Security
Malware Analysis
Threat Intel
Talk
Open →
2022-09
29:00
Unraveling the Russian Snake: Turla
BSides Dallas/Fort Worth
· 2022
Technical
DFIR
Malware Analysis
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-11
52:06
No Disassembly Required
Brian Satira
BSides Peru
· 2018
Technical
DFIR
Malware Analysis
Reverse Engineering
Blue
Talk
Open →
2018-06
View all 433 talks tagged Malware Analysis →